Philip Choo

0 Comments
Last week, onstage at TechCrunch Disrupt, regulator Jina Choi, who heads the SEC’s wide-reaching San Francisco unit, declined to confirm or deny that the SEC is investigating Tesla CEO Elon Musk for possible fraud. Said Choi, “I can’t tell you about any particular investigation in our office. And I can’t confirm or deny the existence
0 Comments
The website of Edinburgh University was still down at the time of writing after the institution suffered a major cyber-attack during its Freshers’ Week. Service provider Jisc told local reporters that it believes the university’s is the only domain affected. A spokesman told the Edinburgh Evening News that the university has “rigid measures in place”
0 Comments
by Danny Bradbury California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post. The State legislature approved ‘SB-327 Information privacy: connected devices’ last Thursday and handed it over to the Governor to sign. The legislation introduces security requirements for connected devices sold in
0 Comments
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created a toaster that could be turned on and off over the internet for the October ’89 INTEROP conference. Then in 2000, LG announced its first internet refrigerator plans. So on and so forth IoT grew
0 Comments
Microsoft and Adobe have each shipped out their scheduled batches of patches to address security flaws in their respective software. Microsoft’s Patch Tuesday this month is addressing 61 security flaws in Windows and other software, notably in web browsers Internet Explorer and Edge, as well as in Office, Sharepoint, Hyper-V, and the .NET Framework. Seventeen
0 Comments
The European Parliament has just voted to back controversial proposals to reform online copyright — including supporting an extension to cover snippets of publishers content (Article 11), and to make platforms that hold significant amounts of content liable for copyright violations by their users (Article 13). Today’s plenary vote in the European parliament was on
0 Comments
When identity and access management doesn’t get the attention it deserves, there tends to be trouble. For both cloud and on-premises systems, a strong set of security access controls and a tight grasp on identity governance can save enterprises from data exposure or data loss, embarrassment and a damaged reputation. Enterprise systems are becoming increasingly
0 Comments
Microsoft released fixes for over 60 CVEs yesterday as part of its monthly update round, three of which have been publicly disclosed and one which was being actively exploited in the wild. CVE-2018-8440 is an Elevation of Privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) which was disclosed by researcher and Twitter user @SandboxEscaper
0 Comments
by John E Dunn Is the Keybase secure messaging browser extension safe to use or not? Respected researcher Wladimir Palant (of AdBlock Plus fame) is so convinced that it isn’t that he has recommended users “uninstall the Keybase browser extension ASAP,” after he discovered what looks like a gap in its claim to offer end-to-end
0 Comments
Keeping pace with online threats can often feel like you’re plugging holes in a dam with your fingers, as soon as you’ve got one challenge under control, another issue pops up somewhere else. As employers create more flexible work conditions (BYOD, remote workforce, etc. and as mobility increases, organizations are faced with an increasingly complex
0 Comments
Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser, today publicly revealed a critical zero-day flaw in the anonymous browsing software that could reveal your identity to the sites you visit. In a Tweet, Zerodium shared a zero-day vulnerability that resides in the NoScript
0 Comments
The perennial optimists at the Search for Extraterrestrial Intelligence, or SETI, have joined the rest of the world in deploying AI to help manage huge datasets — and their efforts almost instantly bore fruit. 72 new “fast radio bursts” from a mysteriously noisy galaxy 3 billion miles away were discovered in previously-analyzed data by using
0 Comments
British police have arrested a 19-year-old teen who is an alleged member of Apophis Squad cybercriminal group responsible for making hoax bomb threats to thousands of schools and airlines; and DDoSing ProtonMail and Tutanota secure email services. George Duke-Cohan was arrested in his bedroom at his family home in Watford by British National Crime Agency
0 Comments
Reports of Jack Ma’s impending retirement are greatly exaggerated, it seems. Ma, the co-founder and executive chairman of Alibaba, has pushed back on claims that he is on the cusp of leaving the $420 billion Chinese e-commerce firm. The New York Times first reported that the entrepreneur plans to announce that he will leave the firm to pursue
0 Comments
Mobile spyware company mSpy has once again leaked millions of customer records to the public internet. The company develops mobile spyware that customers use to monitor the mobile device activity of their children, partners and others. Security researcher Nitish Shah discovered the mSpy leak via a public-facing database and reached out to cybersecurity journalist Brian
0 Comments
Germany-based researchers found a way to spoof certificates, even those protected with PKI-based domain validation, according to the Register. With nothing more than a laptop, the group was able to steal credentials and eavesdrop on certificate authorities. “We evaluated the attack against a number of CAs and we set up a live (automated) demo against one